CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Storage Spaces Controller Elevation of Privilege Vulnerability |
Microsoft DWM Core Library Elevation of Privilege Vulnerability |
Windows Kernel Elevation of Privilege Vulnerability |
Windows Desktop Bridge Elevation of Privilege Vulnerability |
A improper privilege management in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows attacker to execute privileged code or commands via powershell scripts |
AnyDesk before 6.2.6 and 6.3.x before 6.3.3 allows a local user to obtain administrator privileges by using the Open Chat Log feature to launch a privileged Notepad process that can launch other applications. |
Storage Spaces Controller Elevation of Privilege Vulnerability |
Storage Spaces Controller Elevation of Privilege Vulnerability |
Storage Spaces Controller Elevation of Privilege Vulnerability |
Windows Event Tracing Elevation of Privilege Vulnerability |
DirectX Graphics Kernel Elevation of Privilege Vulnerability |
Windows Common Log File System Driver Elevation of Privilege Vulnerability |
Windows Common Log File System Driver Elevation of Privilege Vulnerability |
Windows Nearby Sharing Elevation of Privilege Vulnerability |
Windows Print Spooler Elevation of Privilege Vulnerability |
Windows Common Log File System Driver Elevation of Privilege Vulnerability |
A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.8), Teamcenter V13.0 (All versions < V13.0.0.7), Teamcenter V13.1 (All versions < V13.1.0.5), Teamcenter V13.2 (All versions < 13.2.0.2). The "surrogate" functionality on the user profile of the application does not perform sufficient access control that could lead to an account takeover. Any profile on the application can perform this attack and access any other user assigned tasks via the "inbox/surrogate tasks". |
A vulnerability in the Network Access Manager (NAM) module of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to escalate privileges on an affected device. This vulnerability is due to incorrect privilege assignment to scripts executed before user logon. An attacker could exploit this vulnerability by configuring a script to be executed before logon. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges. |
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker with administrative read-only privileges to download files that should be restricted. This vulnerability is due to incorrect permissions settings on an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to the device. A successful exploit could allow the attacker to download files that should be restricted. |
Improper Privilege Management in GitHub repository chatwoot/chatwoot prior to v2.2. |